Author of the publication

A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.

, , , , , and . J. Netw. Comput. Appl., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extended Entity-Relationship (E²R) Database Specification and its Automatic Verification and Transformation into the Logical Relational Design., and . ER, page 533-549. North-Holland, (1987)Vulnerabilities and Threats in Distributed Systems., and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 146-157. Springer, (2004)A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications.. MobiQuitous, page 1-8. IEEE Computer Society, (2007)Feature analysis of selected database recovery techniques., and . AFIPS National Computer Conference, volume 50 of AFIPS Conference Proceedings, page 543-554. AFIPS Press, (1981)Autonomous Transaction Processing Using Data Dependency in Mobile Environments., , , and . FTDCS, page 138-144. IEEE Computer Society, (2003)Opportunistic Networks: Challenges in Specializing the P2P Paradigm., , and . DEXA Workshops, page 722-726. IEEE Computer Society, (2006)Cost Analysis of Selected Database Restoration Techniques., and . ER, page 783-805. North-Holland, (1983)Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module., and . UCC (Companion"), page 145-150. ACM, (2017)Design issues and an architecture for a heterogenous multidatabase system., , and . ACM Conference on Computer Science, page 74-79. ACM, (1987)On optimal scheduling of integrity assertions in a transaction processing system., and . Int. J. Parallel Program., 10 (5): 315-330 (1981)